Download Hacking Overview - Computer Engineering

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

TV Everywhere wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Computer network wikipedia , lookup

Airborne Networking wikipedia , lookup

Net neutrality law wikipedia , lookup

Cross-site scripting wikipedia , lookup

Net bias wikipedia , lookup

Deep packet inspection wikipedia , lookup

Network tap wikipedia , lookup

Wireless security wikipedia , lookup

Computer security wikipedia , lookup

Distributed firewall wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Piggybacking (Internet access) wikipedia , lookup

Transcript
COEN 250
Security Threats
Network Based Exploits
Phases of an Attack
Reconnaissance
 Scanning
 Gaining Access
 Expanding Access
 Covering Tracks

Reconnaissance

Social Engineering
 “I
cannot access my email. What do I do?”
 Dumpster Diving (especially useful when people
move)

Search the Web
 Sam
Spade (www.samspade.org/ssw/), CyberKit,
NetScanTools, ...
 Search Engine
 Usenet postings
 Whois
Reconnaissance
Databases
 To research .com , .net, and .org domain
names:InterNIC whois feature:
www.internic.net/whois.html allwhois, network
soultions, ...
 ARIN: American Registry for Interent Numbers
(www.arin.net/whoiis/arin-whois.html)
 RIPE (Europe) www.ripe.net
 APNIC (Asia Pacific) www.apnic.net
Reconnaissance: Scanning
Once we have a target, we need to get to
know it better.
Methods:
 War Dialing (to find out modem access)
 Network Mapping
 Vulnerability Scanning
 War Driving
Scanning: War Dialing
Purpose: Find a modem connection.
 Many users in a company install remote PC software
such as PCAnywhere without setting the software up
correctly.
 War Dialer finds these numbers by going through a
range of phone numbers listening for a modem.
 Demon Dialer tries a brute force password attack on a
found connection.
 Typically: war dialing will find an unsecured connection.
Scanning: Network Mapping
Ping:
 ping is implemented using the Internet
Control Message Protocol (ICMP) Echo
Request.
 A receiving station answers back to the
sender.
 Used by system administrators to check
status of machines and connections.
Scanning: Network Mapping
Traceroute:
 Pings a system with ICMP echo requests with
varying life spans (= # of hops allowed).
 A system that receives a package with expired
numbers of hops sends an error message back
to sender.
 Traceroute uses this to find the route to a given
system.
 Useful for System Administration
Scanning: Network Mapping
Cheops:
Network Scanner
(UNIX based)
(Uses traceroute and
other tools to map a
network.)
Cheops et Co. are the
reason that firewalls
intercept pings.
Reconnaissance: Port Scans
Applications on a system use ports to
listen for network traffic or send it out.
 216 ports available, some for known
services such as http (80), ftp, ...
 Port scans send various type of IP
packages to target on different ports.
 Reaction tells them whether the port is
open (an application listens).

Reconnaissance: Nmap
Uses different types of packets to check
for open ports.
 Can tell from the reaction what OS is
running, including patch levels.
 Can run in stealth mode, in which it is not
detected by many firewalls.

Reconnaissance: Webserver
Information Leakage

Most webservers leak information:
 HTTP

answers
Identify webserver
 URLs

Have forms peculiar to certain webservers:

Extensions:
 ASP pages: Probably IIS


“http://search.barnesandnoble.com/booksearch/results.asp?WRD=Oxford+history&z=y&cds2Pid=9481”
 “htm”: Probably windows
Format of query string
 Cookies
Reconnaissance: Webserver
Information Leakage

Most webservers leak information:
 Error
Messages
Identify webserver technology by name and version
number.
 Sometimes send debug information to browser.
 Can be provoked by changing query strings or
asking for non-existing resources.


Sometimes, possible to get a message from the database
engine.
Reconnaissance Prevention

Firewalls can make it very difficult to scan
from the outside.
 Drop
scan packets.
Patched OS do not have idiosyncratic
behavior that allows OS determination.
 IDS can detect internal scans and warn
against them.

Gaining Access
Gain access using application and OS
attacks.
 Gain access using network attack.

Gaining Access through Apps and
OS






Buffer Overflow Attacks

Trends:
 Stack
 Modularized
 Heap
super-tools
 The Metasploit
Project
Dynamic Memory Attacks
Format Vulnerabilities
Integer Overflow
…
Password Attacks
Web Application Attacks



multiple
attacks
multiple
payloads
easily updated
Gaining Access:
Web Application Attacks

The URL not only contains the web
address of a site, but also input:
http://www.google.com/search?hl=en&ie=UTF-8&oe=UTF8&q=web+application+attack

A poorly written webpage allows the
viewer to input data in an uncontrolled
fashion. If the webpage contains SQL, the
user might execute SQL commands.
Gaining Access through Network
Attacks:Sniffing
Sniffer: Gathers traffic from a LAN.
 Examples: Snort www.snort.org, Sniffit
reptile.rug.ac.be/~coder/sniffit/sniffit.html
 To gain access to packages, use spoofed
ARP (Address Resolution Protocol) to
reroute traffic.

Gaining Access: Session
Hijacking
IP Address Spoofing: Send out IP
packages with false IP addresses.
 If an attacker sits on a link through which
traffic between two sites flows, the
attacker can inject spoofed packages to
“hijack the session”.
 Attacker inserts commands into the
connection.
 Details omitted.

Exploiting and Maintaining
Access
After successful intrusion, an attacker
should:
 Use other tools to gain root or
administrator privileges.
 Erase traces (e.g. change log entries).
 Take measures to maintain access.
 Erase security holes so that no-one else
can gain illicit access and do something
stupid to wake up the sys. ad.
Maintaining Access: Trojans

A program with an additional, evil payload.
 Running
MS Word also reinstalls a backdoor.
 ps does not display the installed sniffer.
Maintaining Access: Backdoors
Bypass normal security measures.
Example: netcat
 Install
netcat on victim with the
GAPING_SECURITY_HOLE option.
C:\ nc -1 –p 12345 –e cmd.sh
 In the future: connect to port 12345 and
start typing commands.

Maintaining Access: Backdoors
BO2K (Back Orifice 2000) runs in stealth
mode (you cannot discover it by looking at
the processes tab in the TASK
MANAGER.
 Otherwise, it is a remote control program
like pcAnyWhere, that allows accessing a
computer over the net.

Maintaining Access: Backdoors

RootKit:
A backdoor built as a Trojan of system
executables such as ipconfig.

Kernel-Level RootKit:
Changes the OS, not only system executables.
Covering Tracks:
Altering logs.
 Create difficult to find files and directories.
 Covert Channels through Networks:

 Loki
uses ICMP messages as the carrier.
 Use WWW traffic.
 Use unused fields in TCP/IP headers.
Hacker Damage


Releasing Information
Releasing Software
 By
circumventing copying protection.
 Through IP theft




Consuming Unused(?) Resources
Discover and Document Vulnerabilities
Compromise Systems and Increase their
Vulnerabilities
Website Vandalism
Hacking Profile
Shift to for-profit motiv
 Shift to underground economy
